What is Fog Computing?

Fog Computing is distributed compute, connectivity and storage that allows dynamic sharing of resources across things, network and cloud.…

Read More

What is Value Stream Management?

Value Stream Management (VSM) is derived from lean manufacturing principles, in which a software delivery process is monitored in terms of its efficiency at each step.…

Read More

What are Converged & Hyperconverged Infrastructures?

Converged infrastructure (CI) solutions bundle together compute, storage, networking, and software in an optimized package, while hyperconverged infrastructure (HCI) virtualizes the elements of conventional "hardware-defined" systems.…

Read More

What is Deception Technology?

Deception Technology is a technology used to detect the presence of adversaries on an enterprise network by using decoy systems as a form of ‘bait’.…

Read More

What is a Web of Trust?

A Web of Trust is a decentralized, online identity verification system that is authenticated by ratings given by participants in interlinking reputation networks.…

Read More

What is Swarm Intelligence?

Swarm Intelligence is a paradigm where a collection of simple, autonomous entities interact to create a group that exhibits complex behavior.…

Read More

What is a Botnet?

A botnet is a large group of computers controlled by a single computer, most often used by hackers to launch denial of service attacks, send SPAM, mine for cryptocoin or conduct illegal activities.…

Read More

What is Julia?

Julia is a high performance, open-source programming language sponsored by Darpa, Intel and IBM that is optimized for artificial intelligence, numerical analysis, and computational science.…

Read More

What is Homomorphic Encryption?

Homomorphic Encryption is an encryption scheme that allows software to perform computations on encrypted data without having access to the unencrypted data.…

Read More